Regarding your first question: both variants are possible – it depends on how eDMA channel Transfer Control Descriptor (TCD) registers are configured. eDMA engine supports nested transfers – basically it means there are two counters – minor loop counter which counts bytes transferred during transfer started when DMA request arrived, and major loop counter which counts executed minor loops.
If you set major loop to 1, eDMA will work in Single transfer mode – when DMA request comes, only bytes set in byte count (minor loop counter) are transferred. After transfer completion DONE flag is set and DMA channel retires.
If you set major loop >1, eDMA works in Nested transfers mode – each incoming DMA request starts transfer of data segment with length set in byte count (minor loop counter). When each DMA request is serviced major loop counter is iterated and DMA channel is waiting for next DMA request. This algorithm is executed until required number of major loops (required number of DMA requests) are serviced – then DONE is set and channel retires.
In your example – if you set 256 bytes in byte count (minor loop counter) and 1 in major loop count, when DMA request arrives, all 256 bytes will be transferred at once. But if you set 1 byte in byte count (minor loop counter) and 256 in major loop counter, then after each DMA request 1 byte will be transferred and all 256 bytes will be transferred after 256 DMA requests.
(For detailed eDMA engine explanation please see Functional description chapter in eDMA module description in Kinetis resource manuals)
Regarding your confusion between triggers and requests: DMA requests triggers DMA transfers, so often they means the same, regardless of used mode (Single/Nested). There are different types of sources which can trigger transfer – request from on-chip peripheral, SW request or “always enabled” requests. If Periodic trigger functionality is used, transfer is not triggered until both PIT trigger is asserted AND DMA request from selected source is asserted (This is why always enabled source is used for – it is always asserted).
Best regards,
Lukas